Sciweavers

868 search results - page 156 / 174
» On Analog Signature Analysis
Sort
View
NDSS
2007
IEEE
15 years 3 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
SMC
2007
IEEE
125views Control Systems» more  SMC 2007»
15 years 3 months ago
Scaling with digital connection: Services innovation
—Digitization of production factors, including the knowledge for knowledge workers and consumers, opens almost infinite potential to connect persons, systems, processes, enterpri...
Cheng Hsu
CIVR
2007
Springer
177views Image Analysis» more  CIVR 2007»
15 years 3 months ago
Matching ottoman words: an image retrieval approach to historical document indexing
Large archives of Ottoman documents are challenging to many historians all over the world. However, these archives remain inaccessible since manual transcription of such a huge vo...
Esra Ataer, Pinar Duygulu
IMC
2006
ACM
15 years 3 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
RAID
2005
Springer
15 years 3 months ago
Polymorphic Worm Detection Using Structural Information of Executables
Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
Christopher Krügel, Engin Kirda, Darren Mutz,...